Posted on 04/25/2016 7:45:57 AM PDT by TangledUpInBlue
While being interviewed on WMAL radio in Washington, D.C., Lanny Davis, a longtime Clinton fixer has any political family ever need more fixing? told the hosts that he wouldnt be surprised if Clintons private email server had been hacked. It was such a startling admission that host Larry OConnor had to ask Davis again to make sure that he had not misunderstood him. The second time around, the response was the same.
I wouldnt be surprised because the federal government itself has been hacked, said Davis, but as of now, no, it hasnt been hacked.
No. 1, he cant know whether its been hacked or not. Unless Davis has upgraded his education attending night school, hes neither a computer forensics expert nor a cybersecurity whiz. Hes merely putting the Clinton spin on it.
No. 2, arguing that its OK if Clinton was hacked because the federal government itself has been hacked is no argument at all. Yes, the government has been hacked. But the government has layers of security that her homebrew email system didnt have. It was far more vulnerable to hackers than the secure State Department email that she rejected.
(Excerpt) Read more at investors.com ...
It’s a variation on “everybody does it” — the federal government has been hacked before, therefore it doesn’t matter if Hillary is criminally negligent with national security.
A few more adjectives maybe? Unending, utter, enmity and so on.......
You beat me to it! Old Lanny delivering the bad news before it is public. Then the Clintons will claim, when it is known, that it is old news.... the American public is bored... or my favorite it is too complicated.. (the latter being the excuse for the media not to cover because they are too stupid to understand)
Lanny Davis: The Pee Wee Herman of the Democrat Party.
“You beat me to it! Old Lanny delivering the bad news before it is public. Then the Clintons will claim, when it is known, that it is old news.”
Can’t we just move on?
Why does it need to be hacked? She SOLD the information to the enemy.
Everyone who knows anything knows it was hacked... it's just odd for a democrat to tell the truth. I wonder who he's protecting? It sure ain't Hillary.
Everyone who knows anything knows it was hacked... just odd for a democrat to tell the truth. I wonder who he's protecting? It sure ain't Hillary.
They should be. When this first came out, I thought Hillary should have recused herself. How could she run knowing she just sold out all the data in the Federal Government? I'm no geek, but I immediately thought, "OMG, she had to be hacked. That private server was a back door to our whole Federal Database. Duuh Hillary!" All of our military secrets, all of our R&D, DARPA, NSA, all the agencies. .
After that, she announced she was running for President. She didn't do the honorable choice by not running and she has never apologized to America. Well, what did we expect?
From the article:
"Indeed, a high-ranking former KGB officer told John R. Schindler, a former national security affairs professor at the Naval War College, that of course the Russian foreign intelligence service got it all from Clintons email, and it didn'tt even have to work hard for it."
and
". . Guccifer, famously claimed that I used to read (Clintons) memos . . . and then do the gardening. Take his words seriously because he has been extradited to the U.S., and, according to one intelligence source, is likely in the country to help the FBI make its case against Clinton."
Maybe Guccifer and others are putting the final nails in the coffin. I hope he has good protection.
I can't even wrap my head around the treasonous guilt I would feel for knowingly, ahead of time, placing our whole Federal Database in jeopardy by doing all her private and Secretary of State business at home in a private email server. I found out about a month ago she didn't even have a server/email account at the State Department! Can you imagine? Why she doesn't drop out of the race out of embarrassment is beyond me.
Twenty guesses America why she wanted all of her business dealings, private dealings totally private. Bingo, you're right!
Okay, now it's up to Comey and the FBI. My gut tells me he'll do the right thing and recommend indictment to Loretta Lynch. His reputation and that of the FBI are on the line. Plus he can lateral arabesque this hot potato over to Loretta Lynch. What she does with it is the big question. If she's ethical and competent her next steps are either a grand jury or special counsel/prosecutor. We'll see.
Past musings on the Hillary email/server scandal: Hillary's Server Conundrum: Is it going away? and Hillary Clinton's Email and Server Scandal: Summary Review and Recommendations.
As a sidebar, by all accounts Loretta Lynch is competent. But, as in all things in Washington D.C. currently, it's all about Obama and race. So Lynch will be forced to do nothing. I don't envy her position. Maybe she'll surprise us all.
We're either a Nation of Laws, or We are Not.
No matter what happens, the extent of the damage that occurs will be devastating to Hillary in the general. If she's indicted, she's done. If Lynch and Obama do nothing, it will skyrocket Trump's numbers. Keep in mind, Obama violated Federal Law when he saw she had a private server and said or did Nothing. So, the likely scenario is Comey will do the right thing, Lynch and Obama will continue to do nothing and Trump will beat crooked Hillary in a landslide. Throw in a terrorist attack or two and it's a done deal.
Okay, lets talk about the first 100 days. That's more fun.
From your post:
“...Keep in mind, Obama violated Federal Law when he saw she had a private server and said or did Nothing. ...”
Whenifhow, ping!
http://www.freerepublic.com/focus/news/3424418/posts?page=10#10
Hillary Clinton's Felony. The federal laws violated by the private server
Obama better lawyer up. He saw and Knew Hillary Clinton was operating a private server at her home and Not at a State Dept email address:
18 U.S. Code § 793 - Gathering, transmitting or losing defense information
Current through Pub. L. 114-38. (See Public Laws for the current Congress.) Cornell Law School Legal Information Network
(a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense,
(1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or
(2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer Shall be fined under this title or imprisoned not more than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
44 U.S. Code § 3106 - Unlawful removal, destruction of records. . Cornell Law School Legal Information Network Current through Pub. L. 114-38. (See Public Laws for the current Congress.)
The head of each Federal agency shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, or destruction of records in the custody of the agency of which he is the head that shall come to his attention, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records he knows or has reason to believe have been unlawfully removed from his agency, or from another Federal agency whose records have been transferred to his legal custody. In any case in which the head of the agency does not initiate an action for such recovery or other redress within a reasonable period of time after being notified of any such unlawful action, the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.
Will Loretta Lynch do the right thing and investigate Obama?
"The judge told OReilly that the FBI is at the very end of its investigation and has enough evidence to convict Hillary. Her evidence of guilt is overwhelming, Napolitano told OReilly. The FBI has enough evidence to indict and convict.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.